Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 39.056458] ================================================================== [ 39.057468] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 39.058417] Write of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 39.059430] [ 39.059933] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 39.061281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.062003] Hardware name: linux,dummy-virt (DT) [ 39.062707] Call trace: [ 39.063213] show_stack+0x20/0x38 (C) [ 39.064017] dump_stack_lvl+0x8c/0xd0 [ 39.064655] print_report+0x118/0x5e0 [ 39.065251] kasan_report+0xc8/0x118 [ 39.065982] kasan_check_range+0x100/0x1a8 [ 39.066739] __kasan_check_write+0x20/0x30 [ 39.067451] copy_user_test_oob+0x35c/0xec0 [ 39.068165] kunit_try_run_case+0x14c/0x3d0 [ 39.068881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.069711] kthread+0x24c/0x2d0 [ 39.070342] ret_from_fork+0x10/0x20 [ 39.071003] [ 39.071354] Allocated by task 274: [ 39.072296] kasan_save_stack+0x3c/0x68 [ 39.072952] kasan_save_track+0x20/0x40 [ 39.073599] kasan_save_alloc_info+0x40/0x58 [ 39.074329] __kasan_kmalloc+0xd4/0xd8 [ 39.074960] __kmalloc_noprof+0x188/0x4c8 [ 39.075610] kunit_kmalloc_array+0x34/0x88 [ 39.076261] copy_user_test_oob+0xac/0xec0 [ 39.077056] kunit_try_run_case+0x14c/0x3d0 [ 39.077915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.078720] kthread+0x24c/0x2d0 [ 39.079498] ret_from_fork+0x10/0x20 [ 39.080120] [ 39.080519] The buggy address belongs to the object at fff00000c63a3f00 [ 39.080519] which belongs to the cache kmalloc-128 of size 128 [ 39.082111] The buggy address is located 0 bytes inside of [ 39.082111] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 39.083649] [ 39.084112] The buggy address belongs to the physical page: [ 39.084954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 39.086077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.086996] page_type: f5(slab) [ 39.087653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.088713] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.089797] page dumped because: kasan: bad access detected [ 39.090595] [ 39.090982] Memory state around the buggy address: [ 39.091740] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.092747] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.093680] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.094721] ^ [ 39.095626] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.096530] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.097428] ================================================================== [ 39.142230] ================================================================== [ 39.143122] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 39.144918] Write of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 39.145805] [ 39.146212] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 39.147253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.147999] Hardware name: linux,dummy-virt (DT) [ 39.148984] Call trace: [ 39.150185] show_stack+0x20/0x38 (C) [ 39.151140] dump_stack_lvl+0x8c/0xd0 [ 39.151957] print_report+0x118/0x5e0 [ 39.152644] kasan_report+0xc8/0x118 [ 39.153289] kasan_check_range+0x100/0x1a8 [ 39.154026] __kasan_check_write+0x20/0x30 [ 39.154739] copy_user_test_oob+0x434/0xec0 [ 39.155461] kunit_try_run_case+0x14c/0x3d0 [ 39.156173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.157020] kthread+0x24c/0x2d0 [ 39.157628] ret_from_fork+0x10/0x20 [ 39.158319] [ 39.158742] Allocated by task 274: [ 39.159314] kasan_save_stack+0x3c/0x68 [ 39.159947] kasan_save_track+0x20/0x40 [ 39.160592] kasan_save_alloc_info+0x40/0x58 [ 39.161417] __kasan_kmalloc+0xd4/0xd8 [ 39.162097] __kmalloc_noprof+0x188/0x4c8 [ 39.162813] kunit_kmalloc_array+0x34/0x88 [ 39.163514] copy_user_test_oob+0xac/0xec0 [ 39.164180] kunit_try_run_case+0x14c/0x3d0 [ 39.164888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.165696] kthread+0x24c/0x2d0 [ 39.166290] ret_from_fork+0x10/0x20 [ 39.166942] [ 39.167300] The buggy address belongs to the object at fff00000c63a3f00 [ 39.167300] which belongs to the cache kmalloc-128 of size 128 [ 39.168913] The buggy address is located 0 bytes inside of [ 39.168913] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 39.170516] [ 39.171005] The buggy address belongs to the physical page: [ 39.171806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 39.172845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.173741] page_type: f5(slab) [ 39.174326] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.175355] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.176343] page dumped because: kasan: bad access detected [ 39.177133] [ 39.177506] Memory state around the buggy address: [ 39.178318] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.179345] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.180304] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.181264] ^ [ 39.182227] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.183175] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.184121] ================================================================== [ 38.926636] ================================================================== [ 38.928258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 38.929101] Write of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 38.930513] [ 38.932159] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.934301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.935048] Hardware name: linux,dummy-virt (DT) [ 38.935792] Call trace: [ 38.936327] show_stack+0x20/0x38 (C) [ 38.937076] dump_stack_lvl+0x8c/0xd0 [ 38.937702] print_report+0x118/0x5e0 [ 38.938303] kasan_report+0xc8/0x118 [ 38.939730] kasan_check_range+0x100/0x1a8 [ 38.941116] __kasan_check_write+0x20/0x30 [ 38.941960] copy_user_test_oob+0x234/0xec0 [ 38.943405] kunit_try_run_case+0x14c/0x3d0 [ 38.944321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.945290] kthread+0x24c/0x2d0 [ 38.946831] ret_from_fork+0x10/0x20 [ 38.947749] [ 38.948079] Allocated by task 274: [ 38.948635] kasan_save_stack+0x3c/0x68 [ 38.949819] kasan_save_track+0x20/0x40 [ 38.950489] kasan_save_alloc_info+0x40/0x58 [ 38.951238] __kasan_kmalloc+0xd4/0xd8 [ 38.952042] __kmalloc_noprof+0x188/0x4c8 [ 38.952857] kunit_kmalloc_array+0x34/0x88 [ 38.954085] copy_user_test_oob+0xac/0xec0 [ 38.954837] kunit_try_run_case+0x14c/0x3d0 [ 38.955668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.957577] kthread+0x24c/0x2d0 [ 38.958085] ret_from_fork+0x10/0x20 [ 38.958728] [ 38.959180] The buggy address belongs to the object at fff00000c63a3f00 [ 38.959180] which belongs to the cache kmalloc-128 of size 128 [ 38.960555] The buggy address is located 0 bytes inside of [ 38.960555] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 38.962848] [ 38.963215] The buggy address belongs to the physical page: [ 38.965150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 38.966383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.967470] page_type: f5(slab) [ 38.968148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.969726] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.970875] page dumped because: kasan: bad access detected [ 38.972184] [ 38.972419] Memory state around the buggy address: [ 38.974713] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.976588] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.977198] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.980351] ^ [ 38.981735] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.982750] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.986519] ================================================================== [ 39.099353] ================================================================== [ 39.100076] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 39.102633] Read of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 39.103928] [ 39.104290] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 39.105994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.106553] Hardware name: linux,dummy-virt (DT) [ 39.107190] Call trace: [ 39.107953] show_stack+0x20/0x38 (C) [ 39.108803] dump_stack_lvl+0x8c/0xd0 [ 39.109461] print_report+0x118/0x5e0 [ 39.110081] kasan_report+0xc8/0x118 [ 39.110755] kasan_check_range+0x100/0x1a8 [ 39.111425] __kasan_check_read+0x20/0x30 [ 39.112020] copy_user_test_oob+0x3c8/0xec0 [ 39.112898] kunit_try_run_case+0x14c/0x3d0 [ 39.113610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.114519] kthread+0x24c/0x2d0 [ 39.115120] ret_from_fork+0x10/0x20 [ 39.115825] [ 39.116160] Allocated by task 274: [ 39.116680] kasan_save_stack+0x3c/0x68 [ 39.117314] kasan_save_track+0x20/0x40 [ 39.117871] kasan_save_alloc_info+0x40/0x58 [ 39.118352] __kasan_kmalloc+0xd4/0xd8 [ 39.118932] __kmalloc_noprof+0x188/0x4c8 [ 39.119639] kunit_kmalloc_array+0x34/0x88 [ 39.120415] copy_user_test_oob+0xac/0xec0 [ 39.121293] kunit_try_run_case+0x14c/0x3d0 [ 39.122039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.122854] kthread+0x24c/0x2d0 [ 39.123497] ret_from_fork+0x10/0x20 [ 39.124110] [ 39.124456] The buggy address belongs to the object at fff00000c63a3f00 [ 39.124456] which belongs to the cache kmalloc-128 of size 128 [ 39.126033] The buggy address is located 0 bytes inside of [ 39.126033] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 39.127411] [ 39.127761] The buggy address belongs to the physical page: [ 39.128576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 39.129693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.130591] page_type: f5(slab) [ 39.131096] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.132038] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.132966] page dumped because: kasan: bad access detected [ 39.133859] [ 39.134194] Memory state around the buggy address: [ 39.134856] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.135771] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.136587] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.137531] ^ [ 39.138470] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.139333] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.140323] ================================================================== [ 38.996181] ================================================================== [ 38.997292] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 38.998117] Read of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 38.999595] [ 39.000741] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 39.002143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.003567] Hardware name: linux,dummy-virt (DT) [ 39.004130] Call trace: [ 39.004828] show_stack+0x20/0x38 (C) [ 39.005472] dump_stack_lvl+0x8c/0xd0 [ 39.006209] print_report+0x118/0x5e0 [ 39.006810] kasan_report+0xc8/0x118 [ 39.007323] kasan_check_range+0x100/0x1a8 [ 39.008074] __kasan_check_read+0x20/0x30 [ 39.008761] copy_user_test_oob+0x728/0xec0 [ 39.009826] kunit_try_run_case+0x14c/0x3d0 [ 39.010609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.012077] kthread+0x24c/0x2d0 [ 39.013000] ret_from_fork+0x10/0x20 [ 39.013677] [ 39.014515] Allocated by task 274: [ 39.014816] kasan_save_stack+0x3c/0x68 [ 39.015121] kasan_save_track+0x20/0x40 [ 39.015409] kasan_save_alloc_info+0x40/0x58 [ 39.016026] __kasan_kmalloc+0xd4/0xd8 [ 39.016630] __kmalloc_noprof+0x188/0x4c8 [ 39.017405] kunit_kmalloc_array+0x34/0x88 [ 39.018856] copy_user_test_oob+0xac/0xec0 [ 39.019884] kunit_try_run_case+0x14c/0x3d0 [ 39.021259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.022864] kthread+0x24c/0x2d0 [ 39.023836] ret_from_fork+0x10/0x20 [ 39.024149] [ 39.024323] The buggy address belongs to the object at fff00000c63a3f00 [ 39.024323] which belongs to the cache kmalloc-128 of size 128 [ 39.027402] The buggy address is located 0 bytes inside of [ 39.027402] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 39.030144] [ 39.030585] The buggy address belongs to the physical page: [ 39.031508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 39.032746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.033854] page_type: f5(slab) [ 39.034271] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.035668] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.036929] page dumped because: kasan: bad access detected [ 39.037963] [ 39.038385] Memory state around the buggy address: [ 39.039536] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.040619] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.042814] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.044137] ^ [ 39.045581] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.046105] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.046705] ================================================================== [ 39.185814] ================================================================== [ 39.187396] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 39.188106] Read of size 121 at addr fff00000c63a3f00 by task kunit_try_catch/274 [ 39.188707] [ 39.189130] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 39.191065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.191715] Hardware name: linux,dummy-virt (DT) [ 39.192388] Call trace: [ 39.192902] show_stack+0x20/0x38 (C) [ 39.193826] dump_stack_lvl+0x8c/0xd0 [ 39.194544] print_report+0x118/0x5e0 [ 39.195105] kasan_report+0xc8/0x118 [ 39.195674] kasan_check_range+0x100/0x1a8 [ 39.196268] __kasan_check_read+0x20/0x30 [ 39.196849] copy_user_test_oob+0x4a0/0xec0 [ 39.197679] kunit_try_run_case+0x14c/0x3d0 [ 39.198364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.199289] kthread+0x24c/0x2d0 [ 39.199956] ret_from_fork+0x10/0x20 [ 39.200547] [ 39.200918] Allocated by task 274: [ 39.201578] kasan_save_stack+0x3c/0x68 [ 39.202147] kasan_save_track+0x20/0x40 [ 39.202855] kasan_save_alloc_info+0x40/0x58 [ 39.203398] __kasan_kmalloc+0xd4/0xd8 [ 39.204025] __kmalloc_noprof+0x188/0x4c8 [ 39.204756] kunit_kmalloc_array+0x34/0x88 [ 39.205368] copy_user_test_oob+0xac/0xec0 [ 39.206191] kunit_try_run_case+0x14c/0x3d0 [ 39.206907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.207548] kthread+0x24c/0x2d0 [ 39.208238] ret_from_fork+0x10/0x20 [ 39.208851] [ 39.209168] The buggy address belongs to the object at fff00000c63a3f00 [ 39.209168] which belongs to the cache kmalloc-128 of size 128 [ 39.210815] The buggy address is located 0 bytes inside of [ 39.210815] allocated 120-byte region [fff00000c63a3f00, fff00000c63a3f78) [ 39.212351] [ 39.212713] The buggy address belongs to the physical page: [ 39.213609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 39.214606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.215405] page_type: f5(slab) [ 39.216134] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.216993] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.217455] page dumped because: kasan: bad access detected [ 39.218406] [ 39.218851] Memory state around the buggy address: [ 39.219595] fff00000c63a3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.220544] fff00000c63a3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.221376] >fff00000c63a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.222151] ^ [ 39.223094] fff00000c63a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.224099] fff00000c63a4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.224954] ==================================================================
[ 32.290157] ================================================================== [ 32.293013] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 32.293971] Read of size 121 at addr ffff888101ac2800 by task kunit_try_catch/293 [ 32.295320] [ 32.295606] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.297146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.297998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.298951] Call Trace: [ 32.299225] <TASK> [ 32.299598] dump_stack_lvl+0x73/0xb0 [ 32.300138] print_report+0xd1/0x640 [ 32.300766] ? __virt_addr_valid+0x1db/0x2d0 [ 32.301402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.302101] kasan_report+0x102/0x140 [ 32.302861] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.303535] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.304063] kasan_check_range+0x10c/0x1c0 [ 32.304806] __kasan_check_read+0x15/0x20 [ 32.305423] copy_user_test_oob+0x4ab/0x10f0 [ 32.305992] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.306904] ? finish_task_switch.isra.0+0x153/0x700 [ 32.307492] ? __switch_to+0x5d9/0xf60 [ 32.307859] ? irqentry_exit+0x2a/0x60 [ 32.308221] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 32.309404] ? trace_hardirqs_on+0x37/0xe0 [ 32.309761] ? __pfx_read_tsc+0x10/0x10 [ 32.310327] ? ktime_get_ts64+0x84/0x230 [ 32.311472] kunit_try_run_case+0x1b3/0x490 [ 32.311886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.312489] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.313087] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.313729] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.314482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.314922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.315692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.316395] kthread+0x257/0x310 [ 32.316964] ? __pfx_kthread+0x10/0x10 [ 32.317727] ret_from_fork+0x41/0x80 [ 32.318126] ? __pfx_kthread+0x10/0x10 [ 32.318761] ret_from_fork_asm+0x1a/0x30 [ 32.319247] </TASK> [ 32.319454] [ 32.319679] Allocated by task 293: [ 32.319962] kasan_save_stack+0x3d/0x60 [ 32.320387] kasan_save_track+0x18/0x40 [ 32.320722] kasan_save_alloc_info+0x3b/0x50 [ 32.321914] __kasan_kmalloc+0xb7/0xc0 [ 32.322494] __kmalloc_noprof+0x1c4/0x500 [ 32.322874] kunit_kmalloc_array+0x25/0x60 [ 32.323594] copy_user_test_oob+0xac/0x10f0 [ 32.324009] kunit_try_run_case+0x1b3/0x490 [ 32.325106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.325500] kthread+0x257/0x310 [ 32.325924] ret_from_fork+0x41/0x80 [ 32.326689] ret_from_fork_asm+0x1a/0x30 [ 32.327240] [ 32.327519] The buggy address belongs to the object at ffff888101ac2800 [ 32.327519] which belongs to the cache kmalloc-128 of size 128 [ 32.328835] The buggy address is located 0 bytes inside of [ 32.328835] allocated 120-byte region [ffff888101ac2800, ffff888101ac2878) [ 32.329978] [ 32.330692] The buggy address belongs to the physical page: [ 32.330999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac2 [ 32.331986] flags: 0x200000000000000(node=0|zone=2) [ 32.332450] page_type: f5(slab) [ 32.333483] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.334000] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.334782] page dumped because: kasan: bad access detected [ 32.335549] [ 32.335723] Memory state around the buggy address: [ 32.336552] ffff888101ac2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.337018] ffff888101ac2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337600] >ffff888101ac2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.338209] ^ [ 32.338720] ffff888101ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.339867] ffff888101ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.340682] ================================================================== [ 32.387806] ================================================================== [ 32.388343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 32.389002] Read of size 121 at addr ffff888101ac2800 by task kunit_try_catch/293 [ 32.390605] [ 32.391228] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.392397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.392850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.393924] Call Trace: [ 32.394567] <TASK> [ 32.394881] dump_stack_lvl+0x73/0xb0 [ 32.395287] print_report+0xd1/0x640 [ 32.395863] ? __virt_addr_valid+0x1db/0x2d0 [ 32.396309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.397161] kasan_report+0x102/0x140 [ 32.397769] ? copy_user_test_oob+0x605/0x10f0 [ 32.398493] ? copy_user_test_oob+0x605/0x10f0 [ 32.399208] kasan_check_range+0x10c/0x1c0 [ 32.399940] __kasan_check_read+0x15/0x20 [ 32.400618] copy_user_test_oob+0x605/0x10f0 [ 32.400975] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.401799] ? finish_task_switch.isra.0+0x153/0x700 [ 32.402462] ? __switch_to+0x5d9/0xf60 [ 32.402864] ? irqentry_exit+0x2a/0x60 [ 32.403898] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 32.404409] ? trace_hardirqs_on+0x37/0xe0 [ 32.405092] ? __pfx_read_tsc+0x10/0x10 [ 32.405856] ? ktime_get_ts64+0x84/0x230 [ 32.406483] kunit_try_run_case+0x1b3/0x490 [ 32.407123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.407937] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.408599] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.409243] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.410007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.410495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.411020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.411433] kthread+0x257/0x310 [ 32.411876] ? __pfx_kthread+0x10/0x10 [ 32.412448] ret_from_fork+0x41/0x80 [ 32.412834] ? __pfx_kthread+0x10/0x10 [ 32.413331] ret_from_fork_asm+0x1a/0x30 [ 32.413668] </TASK> [ 32.413966] [ 32.414269] Allocated by task 293: [ 32.414639] kasan_save_stack+0x3d/0x60 [ 32.415114] kasan_save_track+0x18/0x40 [ 32.415599] kasan_save_alloc_info+0x3b/0x50 [ 32.415945] __kasan_kmalloc+0xb7/0xc0 [ 32.416427] __kmalloc_noprof+0x1c4/0x500 [ 32.416880] kunit_kmalloc_array+0x25/0x60 [ 32.417162] copy_user_test_oob+0xac/0x10f0 [ 32.417648] kunit_try_run_case+0x1b3/0x490 [ 32.418183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.418754] kthread+0x257/0x310 [ 32.419102] ret_from_fork+0x41/0x80 [ 32.419585] ret_from_fork_asm+0x1a/0x30 [ 32.419893] [ 32.420054] The buggy address belongs to the object at ffff888101ac2800 [ 32.420054] which belongs to the cache kmalloc-128 of size 128 [ 32.421144] The buggy address is located 0 bytes inside of [ 32.421144] allocated 120-byte region [ffff888101ac2800, ffff888101ac2878) [ 32.421747] [ 32.422004] The buggy address belongs to the physical page: [ 32.422579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac2 [ 32.423356] flags: 0x200000000000000(node=0|zone=2) [ 32.423877] page_type: f5(slab) [ 32.424319] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.424841] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.425460] page dumped because: kasan: bad access detected [ 32.426011] [ 32.426171] Memory state around the buggy address: [ 32.426501] ffff888101ac2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.427187] ffff888101ac2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.427917] >ffff888101ac2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.428614] ^ [ 32.429189] ffff888101ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.429849] ffff888101ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430460] ================================================================== [ 32.342131] ================================================================== [ 32.342926] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 32.343257] Write of size 121 at addr ffff888101ac2800 by task kunit_try_catch/293 [ 32.343624] [ 32.343804] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.344171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.344313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.344560] Call Trace: [ 32.344671] <TASK> [ 32.344772] dump_stack_lvl+0x73/0xb0 [ 32.346065] print_report+0xd1/0x640 [ 32.346673] ? __virt_addr_valid+0x1db/0x2d0 [ 32.347206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.347858] kasan_report+0x102/0x140 [ 32.348513] ? copy_user_test_oob+0x558/0x10f0 [ 32.349174] ? copy_user_test_oob+0x558/0x10f0 [ 32.349861] kasan_check_range+0x10c/0x1c0 [ 32.350483] __kasan_check_write+0x18/0x20 [ 32.351078] copy_user_test_oob+0x558/0x10f0 [ 32.351697] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.352331] ? finish_task_switch.isra.0+0x153/0x700 [ 32.352983] ? __switch_to+0x5d9/0xf60 [ 32.353499] ? irqentry_exit+0x2a/0x60 [ 32.354047] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 32.354675] ? trace_hardirqs_on+0x37/0xe0 [ 32.355091] ? __pfx_read_tsc+0x10/0x10 [ 32.355427] ? ktime_get_ts64+0x84/0x230 [ 32.356223] kunit_try_run_case+0x1b3/0x490 [ 32.356649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.357103] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.358043] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.358684] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.359414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.359998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.360506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.360982] kthread+0x257/0x310 [ 32.361908] ? __pfx_kthread+0x10/0x10 [ 32.362254] ret_from_fork+0x41/0x80 [ 32.362976] ? __pfx_kthread+0x10/0x10 [ 32.363719] ret_from_fork_asm+0x1a/0x30 [ 32.364161] </TASK> [ 32.364672] [ 32.364918] Allocated by task 293: [ 32.365963] kasan_save_stack+0x3d/0x60 [ 32.366322] kasan_save_track+0x18/0x40 [ 32.366611] kasan_save_alloc_info+0x3b/0x50 [ 32.367086] __kasan_kmalloc+0xb7/0xc0 [ 32.368026] __kmalloc_noprof+0x1c4/0x500 [ 32.368464] kunit_kmalloc_array+0x25/0x60 [ 32.368871] copy_user_test_oob+0xac/0x10f0 [ 32.370081] kunit_try_run_case+0x1b3/0x490 [ 32.370431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.371004] kthread+0x257/0x310 [ 32.371660] ret_from_fork+0x41/0x80 [ 32.372388] ret_from_fork_asm+0x1a/0x30 [ 32.372758] [ 32.372943] The buggy address belongs to the object at ffff888101ac2800 [ 32.372943] which belongs to the cache kmalloc-128 of size 128 [ 32.374400] The buggy address is located 0 bytes inside of [ 32.374400] allocated 120-byte region [ffff888101ac2800, ffff888101ac2878) [ 32.375210] [ 32.375890] The buggy address belongs to the physical page: [ 32.376181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac2 [ 32.377131] flags: 0x200000000000000(node=0|zone=2) [ 32.378098] page_type: f5(slab) [ 32.378356] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.379030] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.380056] page dumped because: kasan: bad access detected [ 32.380808] [ 32.381037] Memory state around the buggy address: [ 32.381430] ffff888101ac2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.382181] ffff888101ac2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.382843] >ffff888101ac2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.383721] ^ [ 32.384315] ffff888101ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.385090] ffff888101ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.386250] ================================================================== [ 32.250382] ================================================================== [ 32.250995] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 32.251612] Write of size 121 at addr ffff888101ac2800 by task kunit_try_catch/293 [ 32.252392] [ 32.252690] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.253456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.253834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.254804] Call Trace: [ 32.255037] <TASK> [ 32.255459] dump_stack_lvl+0x73/0xb0 [ 32.256019] print_report+0xd1/0x640 [ 32.256451] ? __virt_addr_valid+0x1db/0x2d0 [ 32.256972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.257494] kasan_report+0x102/0x140 [ 32.258076] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.258583] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.259065] kasan_check_range+0x10c/0x1c0 [ 32.259639] __kasan_check_write+0x18/0x20 [ 32.260092] copy_user_test_oob+0x3fe/0x10f0 [ 32.260656] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.261108] ? finish_task_switch.isra.0+0x153/0x700 [ 32.261655] ? __switch_to+0x5d9/0xf60 [ 32.262252] ? irqentry_exit+0x2a/0x60 [ 32.262685] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 32.263281] ? trace_hardirqs_on+0x37/0xe0 [ 32.263634] ? __pfx_read_tsc+0x10/0x10 [ 32.264087] ? ktime_get_ts64+0x84/0x230 [ 32.264779] kunit_try_run_case+0x1b3/0x490 [ 32.265229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.265787] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.266331] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.266897] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 32.267382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.267899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.268524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.269111] kthread+0x257/0x310 [ 32.269547] ? __pfx_kthread+0x10/0x10 [ 32.269947] ret_from_fork+0x41/0x80 [ 32.270222] ? __pfx_kthread+0x10/0x10 [ 32.270501] ret_from_fork_asm+0x1a/0x30 [ 32.271050] </TASK> [ 32.271330] [ 32.271569] Allocated by task 293: [ 32.272064] kasan_save_stack+0x3d/0x60 [ 32.272479] kasan_save_track+0x18/0x40 [ 32.272934] kasan_save_alloc_info+0x3b/0x50 [ 32.273426] __kasan_kmalloc+0xb7/0xc0 [ 32.273968] __kmalloc_noprof+0x1c4/0x500 [ 32.274414] kunit_kmalloc_array+0x25/0x60 [ 32.274686] copy_user_test_oob+0xac/0x10f0 [ 32.275114] kunit_try_run_case+0x1b3/0x490 [ 32.275844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.276645] kthread+0x257/0x310 [ 32.276949] ret_from_fork+0x41/0x80 [ 32.277484] ret_from_fork_asm+0x1a/0x30 [ 32.277919] [ 32.278189] The buggy address belongs to the object at ffff888101ac2800 [ 32.278189] which belongs to the cache kmalloc-128 of size 128 [ 32.279088] The buggy address is located 0 bytes inside of [ 32.279088] allocated 120-byte region [ffff888101ac2800, ffff888101ac2878) [ 32.279760] [ 32.280038] The buggy address belongs to the physical page: [ 32.280546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac2 [ 32.281314] flags: 0x200000000000000(node=0|zone=2) [ 32.281993] page_type: f5(slab) [ 32.282373] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.283065] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.284061] page dumped because: kasan: bad access detected [ 32.284526] [ 32.284804] Memory state around the buggy address: [ 32.285393] ffff888101ac2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.285945] ffff888101ac2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.286761] >ffff888101ac2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.287247] ^ [ 32.287921] ffff888101ac2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288381] ffff888101ac2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288749] ==================================================================